Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mxm4-5jjv-m5f7

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing a long string followed by a \n (newline) character.

Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing a long string followed by a \n (newline) character.

EPSS

Процентиль: 96%
0.24355
Средний

Связанные уязвимости

nvd
больше 21 года назад

Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing a long string followed by a \n (newline) character.

debian
больше 21 года назад

Buffer overflow in the SETI@home client 3.03 and other versions allows ...

EPSS

Процентиль: 96%
0.24355
Средний